OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the REST API route table in `apis/routes/_rest_routes_standard.inc.php` does not call `RestConfig::request_authorization_check()` for the document and insurance routes. Other patient routes in the same file (e.g. encounters, patients/med) call it with the appropriate ACL. As a result, any valid API bearer token can access or modify every patient's documents and insurance data, regardless of the token’s OpenEMR ACLs—effectively exposing all document and insurance PHI to any authenticated API client. Version 8.0.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/c5e1c44774156cd0d04f4e08ed6a81fe76d38e92 | Patch |
| https://github.com/openemr/openemr/security/advisories/GHSA-f64c-h2gh-g3f9 | Exploit Vendor Advisory |
| https://github.com/openemr/openemr/security/advisories/GHSA-f64c-h2gh-g3f9 | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 14:41
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Open-emr openemr
Open-emr |
|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
| References | () https://github.com/openemr/openemr/commit/c5e1c44774156cd0d04f4e08ed6a81fe76d38e92 - Patch | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-f64c-h2gh-g3f9 - Exploit, Vendor Advisory |
26 Feb 2026, 17:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-f64c-h2gh-g3f9 - |
25 Feb 2026, 19:43
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 19:43
Updated : 2026-02-27 14:41
NVD link : CVE-2026-25164
Mitre link : CVE-2026-25164
CVE.ORG link : CVE-2026-25164
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-862
Missing Authorization
